Installing and using IPA server on CentOS8

FreeIPA server on CentOS8

Discover how to easily set up and manage a secure and centralized authentication system using a FreeIPA server on CentOS 8. Table of Contents Introduction Identity Management or IdM is an essential component in any organization’s IT infrastructure. It is the process of identifying, authenticating, and authorizing users and their access to resources within a […]

Change DNS Settings using the NMCLI utility

Change DNS Settings Using nmcli

In this article, we will review how to change DNS settings using nmcli. In RHEL7 and CentOS7, modifying the ifcfg scripts or /etc/resolv.conf files directly won’t work as they are overwritten by the NetworkManager. Table of Contents Introduction The nmcli command-line (CLI) tool is used for controlling the NetworkManager. It not only displays the network […]

Install brackets on CentOS8

Install brackets on CentOS8

In this article, we will review how to install brackets on CentOS8. This will follow a similar procedure we covered in our previous post: Install Brackets on Ubuntu 20.04. Table of Contents Introduction Brackets was developed by Adobe and first released in 2014. It is one of many text editors used by developers for coding […]

Install Kubernetes Cluster on CentOS8

Kubernetes Cluster Install on CentOS

In this tutorial, we will review the Kubernetes cluster install on CentOS8. This procedure will mirror our previous article about this subject. Install a Kubernetes Cluster on Ubuntu 20.04 Also, this procedure will work for setting up a Kubernetes Cluster on CentOS7 or CentOS9. Table of Contents Introduction Kubernetes is an open-source container orchestration platform […]

Scan for network vulnerabilities using NMAP

Network vulnerability scanning using NMAP

Are you concerned about the security of your network? Learn about for network vulnerabilities scanning using NMAP, a powerful tool that can help you identify potential security issues and keep your network safe from cyber attacks. Table of Contents Introduction Network Mapper (NMAP) is a free and open-source tool used for network exploration, security auditing, […]

Install Komodo Editor on CentOS8

Install Komodo Editor on CentOS8

In this tutorial, we will install Komodo Editor on CentOS8. Granted, it can be installed on any Linux distribution (rpm-based or Debian distro). However, we will demonstrate the installation process using a CentOS8 virtual machine. Table of Contents Introduction Komodo Editor is a free and open-source text editor used for programming and web development. It […]

Build Your Own Docker Registry

Building a docker registry

In this tutorial, you will learn the process involved with building a docker registry. As part of this process, we will set up a web GUI for our registry. The featured image suggests a focus on CentOS8. However, this tutorial will work for RHEL, Fedora, Ubuntu, and most Linux-based distributions. Table of Contents Introduction Docker […]

Install Gedit on CentOS7

Install gedit on CentOS7

In this tutorial, we will install gedit on CentOS7. We are going to use yum for the installation so it’s a straightforward process. The same procedure works for installing gedit on a Red Hat Enterprise Linux 7 (RHEL) machine. Table of Contents Introduction Gedit is a general-purpose text editor designed for the GNOME desktop environment. […]

Install CentOS8 on KVM

Install CentOS8 on KVM

In today’s tutorial, we will install CentOS8 on KVM. The install process is fairly straightforward and we will cover it here step-by-step. We will follow a similar format to the “Install RHEL7 or CentOS7 on a PC” article. The difference is, our CentOS8 instance will run in our KVM virtual environment. Table of Contents Introduction […]

Creating and Managing a GPG Key Pair

GPG key Pair

This article will guide you through the essential steps of creating, editing, backing up, and restoring a GPG key pair, empowering you with the knowledge to enhance the security of your digital communications and data. Table of Contents Introduction In today’s world, where cybersecurity is becoming more of the focus, learning how to create and […]